|
[PATCH v2 0/3] OvmfPkg: Check arguments for validity 2 messages
Some functions across OVMF don't check pointer arguments for validity, which causes null pointer dereferences and crashes in the SCT test suite. This series adds checks to return EFI_INVALID_PARAMETER
Some functions across OVMF don't check pointer arguments for validity, which causes null pointer dereferences and crashes in the SCT test suite. This series adds checks to return EFI_INVALID_PARAMETER
|
By
Dimitrije Pavlov
·
|
|
[PATCH v2 1/3] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results pointers in ExtractConfig are NULL, or if Progress pointer in RouteConfig is NULL. This causes the SCT test suite to crash. Add a check
The current implementation does not check if Progress or Results pointers in ExtractConfig are NULL, or if Progress pointer in RouteConfig is NULL. This causes the SCT test suite to crash. Add a check
|
By
Dimitrije Pavlov
·
|
|
[PATCH v2 3/3] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
The current implementation does not check if Language or DriverName are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL. Cc
The current implementation does not check if Language or DriverName are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL. Cc
|
By
Dimitrije Pavlov
·
|
|
[PATCH v2 2/3] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments
The current implementation does not check if Info or SizeInfo pointers are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL.
The current implementation does not check if Info or SizeInfo pointers are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL.
|
By
Dimitrije Pavlov
·
|
|
[PATCH 01/10] UefiCpuPkg: Create CpuPageTableLib for manipulating X86 paging structs 4 messages
The lib includes two APIs: * PageTableMap It creates/updates mapping from LA to PA. The implementation only supports paging structures used in 64bit mode now. PAE paging structure support will be adde
The lib includes two APIs: * PageTableMap It creates/updates mapping from LA to PA. The implementation only supports paging structures used in 64bit mode now. PAE paging structure support will be adde
|
By
Ni, Ray
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments 2 messages
The current implementation does not check if Language or DriverName are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL. Cc
The current implementation does not check if Language or DriverName are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL. Cc
|
By
Dimitrije Pavlov
·
|
|
[PATCH v1 1/1] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results pointers in ExtractConfig are NULL, or if Progress pointer in RouteConfig is NULL. This causes the SCT test suite to crash. Add a check
The current implementation does not check if Progress or Results pointers in ExtractConfig are NULL, or if Progress pointer in RouteConfig is NULL. This causes the SCT test suite to crash. Add a check
|
By
Dimitrije Pavlov
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments for validity
The current implementation does not check if Info or SizeInfo pointers are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL.
The current implementation does not check if Info or SizeInfo pointers are NULL. This causes the SCT test suite to crash. Add a check to return EFI_INVALID_PARAMETER if any of these pointers are NULL.
|
By
Dimitrije Pavlov
·
|
|
[Patch 0/2] Remove MptScsi and PvScsi reviewers 4 messages
The email addresses for the reviewers of the MptScsi and PvScsi in the OvmfPkg are no longer valid. Remove the reviewers for the MptScsi and PvScsi drivers until new maintainers/reviewers can be ident
The email addresses for the reviewers of the MptScsi and PvScsi in the OvmfPkg are no longer valid. Remove the reviewers for the MptScsi and PvScsi drivers until new maintainers/reviewers can be ident
|
By
Michael D Kinney
·
|
|
[PATCH v1 1/1] OvmfPkg: increase max debug message length to 512 2 messages
From: Laszlo Ersek <lersek@...> Increase the maximum line length for debug messages. While log messages should be short, they can still get quite long, for example when printing device paths or config
From: Laszlo Ersek <lersek@...> Increase the maximum line length for debug messages. While log messages should be short, they can still get quite long, for example when printing device paths or config
|
By
Oliver Steffen
·
|
|
[PATCH v2] MdeModulePkg/NonDiscoverablePciDeviceDxe: Allow partial
FreeBuffer 11 messages
Add support for partial free of non cached buffers. If a request for less than the full size is requested new allocations for the remaining head and tail of the buffer are added to the list. Added ver
Add support for partial free of non cached buffers. If a request for less than the full size is requested new allocations for the remaining head and tail of the buffer are added to the list. Added ver
|
By
Jeff Brasen
·
|
|
[edk2-platforms][PATCH v4 4/6] Socionext: Platform Build: Resolving newly introduced dependency 2 messages
Hi Ard, Could you please help review this patch? Any feedback in appreciated. Regards, Kun
Hi Ard, Could you please help review this patch? Any feedback in appreciated. Regards, Kun
|
By
Kun Qin
·
|
|
[PATCH edk2-platforms v1 1/1] Platform/ARM: FVP: Fix build break when Secure Boot is enabled 2 messages
The edk2 patch at: "6eb407947592 SecurityPkg: SecureBootVariableLib: Added newly supported interfaces" introduced a new dependency of PlatformPKProtectionLib to SecureBootVariableLib. This causes the
The edk2 patch at: "6eb407947592 SecurityPkg: SecureBootVariableLib: Added newly supported interfaces" introduced a new dependency of PlatformPKProtectionLib to SecureBootVariableLib. This causes the
|
By
Sami Mujawar
·
|
|
[PATCH 2/2] OvmfPkg/OvmfPkgX64: Allow runtime control of IPv4 and IPv6 support 2 messages
Wire up the newly added DriverLoadInhibitorLib in a way that ties dispatch of the Ip4Dxe and Ip6Dxe drivers to QEMU fw_cfg variables 'opt/org.tianocore/IPv4Support' and 'opt/org.tianocore/IPv6Support'
Wire up the newly added DriverLoadInhibitorLib in a way that ties dispatch of the Ip4Dxe and Ip6Dxe drivers to QEMU fw_cfg variables 'opt/org.tianocore/IPv4Support' and 'opt/org.tianocore/IPv6Support'
|
By
Ard Biesheuvel
·
|
|
[PATCH] OvmfPkg: Update I/O port related to ACPI devices for CloudHv 2 messages
From: Sebastien Boeuf <sebastien.boeuf@...> Both ACPI shutdown and ACPI PM timer devices has been moved to different port addresses in the latest version of Cloud Hypervisor. These changes need to be
From: Sebastien Boeuf <sebastien.boeuf@...> Both ACPI shutdown and ACPI PM timer devices has been moved to different port addresses in the latest version of Cloud Hypervisor. These changes need to be
|
By
Boeuf, Sebastien
·
|
|
[OVMF] Using EFI_TIMESTAMP_PROTOCOL in OVMF
Hello everyone. I wanted to ask if there was a device/parameter to have `EFI_TIMESTAMP_PROTOCOL` in OVMF. I would like to use this protocol to provide monotonic time in Rust (and fall back to platform
Hello everyone. I wanted to ask if there was a device/parameter to have `EFI_TIMESTAMP_PROTOCOL` in OVMF. I would like to use this protocol to provide monotonic time in Rust (and fall back to platform
|
By
Ayush Singh
·
|
|
[PATCH EDK2 v2 0/1] MdeModulePkg/PiSmmCore:Avoid overflow risk
Main Changes since v1 : 1.treate overflow as overlap Wenyi Xie (1): MdeModulePkg/PiSmmCore:Avoid overflow risk MdeModulePkg/Core/PiSmmCore/PiSmmCore.c | 5 ++++- MdeModulePkg/Core/PiSmmCore/PiSmmIpl.c
Main Changes since v1 : 1.treate overflow as overlap Wenyi Xie (1): MdeModulePkg/PiSmmCore:Avoid overflow risk MdeModulePkg/Core/PiSmmCore/PiSmmCore.c | 5 ++++- MdeModulePkg/Core/PiSmmCore/PiSmmIpl.c
|
By
wenyi,xie
·
|
|
[PATCH EDK2 v2 1/1] MdeModulePkg/PiSmmCore:Avoid overflow risk
As the CommunicationBuffer plus BufferSize may overflow, check the value first before using. Cc: Jian J Wang <jian.j.wang@...> Cc: Liming Gao <gaoliming@...> Cc: Eric Dong <eric.dong@...> Cc: Ray Ni <
As the CommunicationBuffer plus BufferSize may overflow, check the value first before using. Cc: Jian J Wang <jian.j.wang@...> Cc: Liming Gao <gaoliming@...> Cc: Eric Dong <eric.dong@...> Cc: Ray Ni <
|
By
wenyi,xie
·
|
|
[PATCH] DynamicTablesPkg: Add support to build _DSD 3 messages
Add APIs needed to build _DSD with different UUIDs. This is per ACPI specification 6.4 s6.2.5. Adds support for building data packages with format Package {"Name", Integer} Signed-off-by: Jeff Brasen
Add APIs needed to build _DSD with different UUIDs. This is per ACPI specification 6.4 s6.2.5. Adds support for building data packages with format Package {"Name", Integer} Signed-off-by: Jeff Brasen
|
By
Jeff Brasen
·
|
|
[PATCH 1/2] OvmfPkg: Introduce NULL class library to inhibit driver load
Add a new library that can be incorporated into any driver built from source, and which permits loading of the driver to be inhibited based on the value of a QEMU fw_cfg boolean variable. This will be
Add a new library that can be incorporated into any driver built from source, and which permits loading of the driver to be inhibited based on the value of a QEMU fw_cfg boolean variable. This will be
|
By
Ard Biesheuvel
·
|